VPN’s – promise, pitfall, implementation and policy don murdoch 757 683 4580 odu – isso dmurdoch odu dot edu.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
NetComm Wireless VPN Functionality Feature Spotlight.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network
Virtual Private Networks and IPSec
Virtual Private Networks
IPSec Detailed Description and VPN
Virtual Private Networks
SECURING NETWORK TRAFFIC WITH IPSEC
CIT 480: Securing Computer Systems
Understand Networking Services
Virtual Private Network
Lecture 36.
Lecture 36.
Presentation transcript:

VPN’s – promise, pitfall, implementation and policy don murdoch odu – isso dmurdoch odu dot edu

Agenda VPN’s defined Promises Pitfalls Implementations Policies

VPN’s defined Virtual Private Network Ensures private, secure communication between hosts over an insecure medium using “tunneling” Usually between geographically separate locations Connecting computer is logically directly connected to a network –has a local address that it uses to communicate through the tunel

Tunneling defined Encapsulation Put one type of packet inside another Can put non IP protocols inside of IP Requires Consistent rules on each side Both parties must be aware of tunnel for it to work Tables to keep track of the conversation Not a panacea Traffic patterns can be observed even through the data is likely to be protected

Back to defining VPN’s Commonly use standardized, well respected encryption to secure communications Two main types of VPNs – Remote-Access from a client system Site-to-Site – between two networks

VPN advantages Control remote access through one perimeter device Close off other avenues of remote access Devices all obey the same rules Single access point allows for activate / deactivate accounts Provide high quality logging of remote access activity Plug other holes Avoid excess provisioning costs Of dedicated lines, not devices ….

Promises Originally designed as inexpensive alternative WAN over leased lines Variety of existing insecure channels exist such as the commodity Internet Now mostly used to securely connect computers and remote sites over the internet Convenient (somewhat) Can now communicate securely over insecure protocols and channels

Promises – an example Example – it *may* simplify security Assume a simple security policy Internal IP based access management An Intranet with site-licensed software Before VPN, complicated to allow access Train all employees to use SSH tunnel Provide a tunnel support server After VPN, employees can be offsite and connect VPN client is assign an internal IP address Minimal impact on Intranet servers rules

Pitfalls Not always easy to use Some client security software wants to reconfigure on the fly Multiple tunnels can be impossible May require address changes in order to be implemented Home Network ISP’s avoid static IP address and some don’t allow VPN traffic Overall support Client installs can be challenging Name lookups can be difficult Mapping to a share or app server requires … ????

Falling in more pits Expectations of users – the term “VPN” means different things to different people Frequently Frustrating Troubleshooting Interoperability with other Networks/VPNs can be problematic Small performance overhead VPN client bound by network rules

Quagmire Local network is now subject to any security issues on the remote client Microsoft’s source code believed to be stolen by a game developer w/ a remote control Trojan … Enticed to install a game demo Trojan alerts controller when on Internet Trojan takes actions while user connected via VPN Trojan reports back to controller

The Quicksand of Split Tunneling Some VPN’s allow clients to send “secured” data to the VPN gateway while allowing general network access Danger is that this process setups two paths – one to the Commodity Internet and the other to the site Access rules often defined on client as a “network access list”, exposing private site data and configuration

Implementations Point to Point Tunneling Protocol Data encapsulated into a PPP packets, then GRE packets sent along. Channel for data and for control IPSec (discussed next) Secure Shell Interactive login w/ port forwarding capability Secure Socket Layer VPN Layer 2 Tunneling Protocol

IPSec Common & preferred connection method today Can add authentication and / or confidentiality to the traffic or both Coexists w/ current IP implementations and infrastructure components such as routers, analysis tools, etc. Can be very complicated to troubleshoot It’s very nature is designed to prevent eavesdropping!

Tunnel and Transport Tunnel Encapsulates each of the original packet inside another packet Transport Adds an IPSec header to the original packet Allows for detecting errors or changes in transit Does not have to automatically encrypt data Insures authenticity of the source

Transport illustrated Original IP Header Original TCP Header Original Data Mod’d IP Header Original TCP Header Original Data IPSec Header Add IPSec Header – change the “protocol field” in the IP Header, allowing Systems to interpret the data that follows as IPSec

Tunnel illustrated Original IP Header Original TCP Header Original Data Mod’d IP Header Original TCP Header Original Data IPSec Header Add IPSec Header – change the “protocol field” in the IP Header, allowing Systems to interpret the data that follows as IPSec Original IP Header

AH Authentication Header protocol Offers Authenticity and Integrity w/o encryption Uses cryptographic hash to verify each packet Covers entire packet and will not survive NAT If any part of original message changes, it will be detected Prevents IP Spoofing and transmission errors

ESP Encapsulating Security Protocol Provides Integrity Provides Confidentiality Transport Encrypts payload of the data Tunnel Encrypts original IP header May cause IP fragmentation

Most likely implementation ESP builds tunnel Split tunneling not possible Shared secret “password”, hopefully a certificate Connect to concentrator Get private IP on the network Get all access (often dangerous) Little to no Internet access over the VPN

Most likely (illustrated) Original IP Header Original TCP Header Original Data Mod’d IP Header Original TCP Header Original Data ESP Header Add IPSec Header – change the “protocol field” in the IP Header, allowing Systems to interpret the data that follows as IPSec Original IP Header Encrypted original packet

VPN Concentrators Concentrator is NOT a gateway or firewall Many sites implement it parallel to a firewall Specialized device Only accepts connections from VPN peers Handles encryption and VPN management Authenticates clients Against local database or through RADIUS or TACACS+ RADIUS / TACACS+ can (and should) defer to a centralized LDAP directory Enforces VPN security policies

Concentrator connections Steps Establish username / password / access restrictions (IP, encryption, Time, source …) Install client software if necessary Win2000 has VPN client software User defines “VPN Connection” to the site Makes connection Now can ONLY talk to the site

Example w/ Cisco VPN client

Implementation Issues Additive to remote access procedure and policy Require strongest mutual authentication Placement Just where to these devices go? System Appliance, Firewall integration, software

Policies part one Like every year, APA audits different things Missing a “VPN” specific policy w/ rules Wrote a VPN policy Wrote a specific access form w/ clear statements, authorized signature Needed to change it almost immediately!

Policies part two Can anyone install the client? Where can anyone use the client from? Do you allow home users on their own personal (non CoVA) PC’s to connect? What are the minimum client security requirements? Who supports what? Who handles the investigation should an incident occur? Who monitors connections and when?

A few more issues … Do you allow connections back out to the Internet w/o a proxy? Or at all? Do you intend on providing “access groups” or provide general access? Remember – this is a known, sanctioned back door into the network from anywhere..